package cn.manmanda.api.util;
import javax.servlet.http.HttpServletRequest;
/**
* 防止SQL注入工具类
* @author
* @date 2017/12/29 15:39
*/
public class AntiSQLInjectionUtil {
//public final static String regex = "#|/*|*/|'|%|--|and|or|not|use|insert|delete|update|select|count|group|union"
//+ "|create|drop|truncate|alter|grant|execute|exec|xp_cmdshell|call|declare|source|sql";
public final static String regex = "'|and|exec|execute|insert|select|delete|update|count|drop|*|%|chr|mid|master|truncate|" +
"char|declare|sitename|net user|xp_cmdshell|;|or|-|+|,|like'|and|exec|execute|insert|create|drop|" +
"table|from|grant|use|group_concat|column_name|" +
"information_schema.columns|table_schema|union|where|select|delete|update|order|by|count|*|" +
"chr|mid|master|truncate|char|declare|or|;|-|--|+|,|like|//|/|%|#";
/**
* 把SQL关键字替换为空字符串
*
* @param param
* @return
*/
public static String filter(String param) {
if (param == null) {
return param;
}
return param.replaceAll("(?i)" + regex, ""); // (?i)不区分大小写替换
}
/**
* 返回经过防注入处理的字符串
*
* @param request
* @param name
* @return
*/
public static String getParameter(HttpServletRequest request, String name) {
return AntiSQLInjectionUtil.filter(request.getParameter(name));
}
public static void main(String[] args) {
// System.out.println(StringEscapeUtils.escapeSql("1' or '1' = '1; drop table test"));
// //1'' or ''1'' = ''1; drop table test
String str = "sElect * from test where id = 1 And name != 'sql' ";
String outStr = "";
for (int i = 0; i < 1000; i++) {
outStr = AntiSQLInjectionUtil.filter(str);
}
System.out.println(outStr);
}
}